Computer SystemSoftware Questions • Digital computers are computer are classified into four categories what are they? Micro Computers, Mainframe Computer and Super Computers • PC/XT stands for: Personal Computers Extended Technology • PC/AT stands for: Personal Computers Advance Technology • MIPS is Million Instructions per Second • Examples of Mini computer IBM AS/400/B60, VAX 8842, WIPROGENIUS, WIPRO LANDMARK 860, HP9000 etc. • In the case of micro computer speed of CPU is: (1-10MPS) Speed of CPU in case of mini computer (20-50 MIPS) • The program change that makes up the operating system along with associated utility program change, as distinct from an application program is: System software • 4GL stands for: Fourth generation language • The basics of Internet: TCP/IP • A standard protocol that that describes communication between computers, synthesizers and musical instrument: MIDI • The main memories have three distinct parts, what are they? RAM, ROM, Cache • Language processing means: Analysis of source program +synthesis phase • Language processor consists of two phases. What are they? Analysis phase and synthesis phase • The process of recognizing the lexical component in a source string is called: Scanning • There are two fundamental approaches to parsing. What are they? Top Down parsing and Bottom Up parsing • MDT stands for: Macro Definition Table • SST stands for: Sequencing Symbol Table • ATP stands for: Actual Parameter Table • In compiler, which analyzer convert s the source program into a sequence of atomic units called tokens? Lexical Analyzer • Identifiers, keywords, constants, operators, and punctuation Symbols such as commas and parentheses are typical: Tokens • The name of device used for user to computer communications, usually the display and keyboard is called: Consol • What is CON? It is the abbreviation for consol • CAE stands for: Computer aided engineering • CADD stands for: Computer aided drafting and design • The leading personal computer software company Microsoft Corporation founded in which year? 1975 by Bill Gates & Paul Allen • What is Microsoft’s first product? A BASIC Interrupter for the Intel 8080 up • Windows 3 was released in which year? March 1990 • POSIX stands for: Portable Operating System Interface • PASCAL was developed by: Niklaus Wirth COMPUTER GENERAL QUIZ QUESTIONS • COBOL is acronym for: Common Business Oriented Language • BASIC is acronym for: Beginners All Purpose Symbolic Instruction Code • KB, MB, GB, is respectively: Kilo Bites Mega Bites Giga Bites • A set of 8 bits is called: Bite • A set of 4 bit is called: Nibble • HDD and FDD are respectively: Hard Disk Drive, Floppy Disk Drive • Winchester drive is also called: Hard disk Drive • The center processing unit of a computer consist 3 units namely: Arithmetic Logic Unit, Control Unit, Memory Unit • A program written using binary codes is called: Machine language • The computer which has incorporated the characters of analog and digital computers is: Hybrid computers • The medium is used by input dives light pen for graphical input is: CRT screen • SMPS stands for: Switch Mode Power Supply • UPS stands for: Uninterrupted Power Supply • The translator program that translates each line of the source program as it run is called: Interpreter • The pictorial representation of the procedure proposed to solve a problem by a program: Flow chart • ANCII stands for: American Standard Code for Information Interchange • ANSI stands for: American National Standard Institute • EBCDIC is the acronym for: Extended Binary Coded Decimal Interchange Code • ERP packages are: Enterprise Resource Planning Package • Example for ERP packages: SAP, BAN etc.. • Write office automation package of Microsoft: Ms Office • The time gap during the failure of a computer system is also called Down Time • What is meant by ‘system analyst’? A person who examine and defines actives, flow and problems to be solved and system and procedures to determine hoe best the necessary operation can accomplished • Fetch means: To retrieve data or instructions from storage • UNIX was developed by: Bell laboratory s • What is INTERNET? Internet is the world's largest computer network, the "network of networks". Scattered all over the world • When was the INTERNET Created? It was created thirty six years ago as a project of U.S Department of Defense, • What Internet service provider (ISP)? It is the companies that provide INTERNET access. • What is WWW? It is the system based hypertext and HTTP for providing organizing and accessing wide verity of resources that are available by the INTERNET. • What is web page? It is a unit of information often called a document that is available over the WWW. • Name the protocol that allows a computer to use the TCP/IP protocol and connected directly to the Net using a standard voice telephone line and high speed modem: P P P (point-to-point protocol)] • It is a software program that acts as an interface between the user and WWW what is it? Web Browser • Name two different type of Web Browser: Text-based browser and Graphical Browser • It collects and organizes resources that are available via the WWW, and designed to provide a starting point for locating information. Name it: Web Index • It is an interactive tool that enables to locate information available via Name it: Search Engine • It is unique, numeric identifier used to specify a particular host computer on a particular network, and is part of a global , standard’s scheme of identifying machines that are connected with INTERNET Name it: IP Address (Internet Protocol) • It is the way of identify and locate computers connected to the INTERNET Name it: Domain Name • It provides hierarchical way of identifying and locating INTERNET resources on the WWW Name It: Uniform Resources Locater (URL) • A binding document signed by all users that explains the rules of INTERNET use at an institution. Name it: Acceptable user policy (AUP) • What is gopher? It is a protocol designed to search, retrieve and display documents from remote site on the Internet • It is an Internet search tool that has the capability of searching many databases at one time. Name it: Wide area information service (WAIS) • What is FTP (file transfer protocol?) The medium that allows transferring of files between computers on the net using an FTP program or via Netscape • What is E-Journal? It is an electronics publications, typically found in academic circles • What is NNTP? Network News Transport Protocol-This is used to distribute network news • Name the security feature that allows access to information on an individual basis: Authentication MIPS is an acronym for: Millions of instructions per second The duplicate copy of data/program on a separate storage medium is called: Back up A center processor placed on a semi-conductor chip is called as a: Microprocessor Who invented the modem? AT&T Information System, USA Which is standard internet protocol for distributing E-Mail? SMTP (Simple Mail Transfer Protocol) The computer generated environment is called: Virtual Who coined the term hypertext in 1965? Ted Nelson Which protocol provides basis for the net? Internet Protocol –IP What is a kernel module? Answer A kernel module is a set of code that can be dynamically loaded and unloaded into the Operating System kernel at run-time. Typically, a kernel module is used to encode a device driver to allow the operating system to interact with a new piece of hardware (e.g. your mouse, keyboard, robot, camera etc.). What is CVS and what is it used for? Answer CVS, stands for Concurrent Versions System. It is a tool (a set of programs) that maintain a central repository that records the full history of changes to the files stored in the repository. Typically, you would store the code you are working on for a project in a CVS repository. By keeping the full history of changes you can keep track of your work, and also restore (or backup) from a recent change e.g. you introduced a bug. What is SCP and what is it used for? Answer SCP, (Secure CoPy), is a copying program that allows you to securely copy files between two different computers that are linked via the internet. It essentially runs a copy program using SSH to get the secure connection. What is dynamically stable walking, explain and give an example? Answer Dynamically stability for a walking robot (or animal) means that at some time during its walking cycle its center of gravity, when projected onto the ground, is not located within the support hull of its ground contact points. In simpler english, it means that the robot must actively balance itself to prevent falling. If it were to freeze, it would fall over. Most wheeled robots are statically stable. Humans, and most biped robots and humanoids, are dynamically stable meaning they must continuously control their balance to prevent falling over. What is grep and what is it used for? Answer Grep is a program for searching through files for lines that match a given regular expression. For example, if I wanted to find the name Noura in a set of text files I could run grep with: grep Noura my_text_file1.txt text_file2.txt etc. What is GPS? How does it work? Answer GPS, or Global Positioning System, is a satellite-based navigation system. GPS works via a system of satellites and receiving devices used to compute positions on the Earth. The basis of GPS is "triangulation" from satellites. To "triangulate," a GPS receiver measures distance using the travel time of radio signals. To measure travel time, GPS needs very accurate timing which it achieves with some tricks. Along with distance, you need to know exactly where the satellites are in space. High orbits and careful monitoring are the secret. Finally you must correct for any delays the signal experiences as it travels through the atmosphere. What is the name of the wheel configuration/drive mechanism on the MARS rovers? Why did NASA pick this mechanism? Answer The current Mars rovers use a rocker-bogie suspension system which allows a rover to safely navigate steps and obstacles twice the height of its wheels. NASA's Jet Propulsion Laboratory patented this suspension system. The rocker-bogie suspension joins the three wheels on each side with only two swinging joints, and it connects the whole three-wheeled bogie to the chassis at a single point. The structure has no springs, and the freely rotating joints flex to conform to ground contours and climb obstacles. The rover combines independent drive and individual steering (Ackerman steering) for each wheel. What is an advantage and a disadvantage of using sonar? (in comparison to other sensors) Answer Sonar as used in robots, typically consists of sending out a pulse of sound and listening for the echo. By calculating the time from the initial pulse to the return echo, and knowing the speed of sound, it becomes possible to calculate the distance to the target object. Variants on sonar include changing the frequency of the sound wave generated, and using psuedo random pulse sequences and looking for the range that gives the maximum likelihood response. Advantages of sonar: Relatively simple sensor, so low cost with easy electronics An active sensor that gives range to nearest surface Very good underwater, where nearly every other sensor is not good Disadvantages: Distance estimates can vary a lot and be quite noisy for a number of reasons: o Speed of sound varies as a function of air pressure and temperature. Ability of sound to travel is also a function of air humidity. o Reflection strength depends upon the properties of the surface and the incidence angle o Multiple reflections are possible. Cross-talk between multiple sensors is sometimes a problem (they hear one another) sensor projects in a cone so it is not a fine resolution sensor. What was the goal of the NASA mission that sent Spirit and Opportunity to Mars? Did it succeed? Answer NASA's twin robot geologists, the Mars Exploration Rovers, launched toward Mars on June 10 and July 7, 2003, in search of answers about the history of water on Mars. They landed on Mars January 3 and January 24 PST (January 4 and January 25 UTC). The Mars Exploration Rover mission is part of NASA's Mars Exploration Program, a long-term effort of robotic exploration of the red planet. Primary among the mission's scientific goals is to search for and characterize a wide range of rocks and soils that hold clues to past water activity on Mars. The spacecraft are targeted to sites on opposite sides of Mars that appear to have been affected by liquid water in the past. The mission was considered a success when Opportunity found new evidence of water on Mars. Who is the current director of the Robotics Institute and what is his/her area of expertise? Answer The current director of the Robotics Institute is Professor Matthew T. Mason. Matt Mason earned his BS, MS, and PhD degrees in Computer Science and Artificial Intelligence at MIT, finishing his PhD in 1982. Since that time he has been on the faculty at Carnegie Mellon University, where he is presently Professor of Computer Science and Robotics, and Director of the Robotics Institute. His research interests are in robotic manipulation, including manufacturing automation, mobile manipulation, and robotic origami. He is co-author of "Robot Hands and the Mechanics of Manipulation" (MIT Press 1985), co-editor of "Robot Motion: Planning and Control" (MIT Press 1982), and author of "Mechanics of Robotic Manipulation" (MIT Press 2001). He is a winner of the System Development Foundation Prize, a Fellow of the AAAI, and a Fellow of the IEEE. In Robotics, what does SLAM stand for? What is it used for? Answer SLAM stands for Simultaneous Localization and Mapping. As indicated by the term, it is used for getting a robot to provide a fully autonomous answer to the question ``Where am I?. It demands that the robot derive a map from its perceptions while moving through the environment and simultaneously determine its own position in that map. Who was the founding director of the Robotics Institute? What is his/her most recent link to Qatar? Answer The founding director of the Robotics Institute is Professor Raj Reddy who was recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser University Professor of Computer Science and Robotics. What are particle filters and Kalman filters most commonly used for in Robotics? Answer Particle filters and Kalman filters are state estimation filtering techniques. Both of these are use d alot in robotics to estimate the state of a system. For example, we could use them to estimate the location of the robot (this is localization), or where objects are around the robot (tracking). These are probabilistic techniques, and are very good for handling noise, uncertainty, and all of the general limitations found in real sensors. Essentially, instead of just keeping track of the state, the two methods estimate the probability distribution over the state space. Kalman filters use a Gaussian noise assumption, so they only keep track of the mean and variance of the state estimate (as that is all you need for a gaussian). Particle filters are non-parametric and can represent any distribution if you have enough particles. These methods are mostly used for localization, tracking of objects, inferring the behavior of say another robot, and to estimate when things may be broken. What is a genetic algorithm? How does it work? Answer Genetic algorithms are a part of evolutionary computing; a popular area of artificial intelligence. Genetic algorithms are inspired by Darwin's theory of evolution. Simply said, problems are solved by an evolutionary process resulting in a best (fittest) solution (survivor) - in other words, the solution is evolved. When using a genetic algorithm we represent a solution to a given problem as a genome (or chromosome). The genetic algorithm then creates a population of solutions and applies genetic operators such as mutation and crossover to evolve the solutions in order to find the best one(s). Name a robot that Carnegie Mellon University sent to the Antarctic and a robot we sent to the Arctic. What were the missions of these robots? Did they succeed? Answer Carnegie Mellon University sent the Nomad robot to the Antarctic to perform autonomous search of meteroites, and the Hyperion robot to the Arctic to demonstrate sun-synchronous circumnavigation (i.e. can a solar-powered robot plan and execute a circuitious route that takes into account its energy requirements and the position of the sun and shadows). Both robots succeeded in their missions. The Robotics Institute has had 4 directors to date. You’ve learned about the founding director and the current director so far. Who were the other two directors and what were their areas of expertise? Answer The second director of the Robotics Institute was Professor Takeo Kanade and the third director was your own Dean Chuck Thorpe. Dr. Kanade received his Ph.D. in Electrical Engineering from Kyoto University, Japan, in 1974. After being on the faculty at Department of Information Science, Kyoto University, he joined Computer Science Department and Robotics Institute in 1980. He became Associate Professor in 1982, a Full Professor in 1985, the U. A. and Helen Whitaker Professor in 1993, and a University Professor in 1998. He became the Director of the Robotics Institute in 1992. He served as the founding Chairman (1989-93) of the Robotics Ph. D. Program at CMU, probably the first of its kind in the world. Dr. Kanade has worked in multiple areas of robotics, ranging from manipulator, sensor, computer vision, multi-media applications and autonomous robots, with more thatn 200 papers on these topics. He has been the founding editor of International Journal of Computer. Charles E. “Chuck” Thorpe is the first dean of Carnegie Mellon University in Qatar, and a member of its faculty teaching robotics and advising Ph.D. students. Previously he was the director of Carnegie Mellon University’s Robotics Institute, where he had been a principal research scientist and founding head of its robotics master’s program. Thorpe holds a doctor’s degree from the School of Computer Science and is one of the university’s first alumni to pursue a career in robotics. His advisers were Raj Reddy, founding director of the Robotics Institute, and Hans Moravec, one of the world’s first developers of autonomous mobile robots. In 1984, he wrote his doctoral thesis in vision and path planning. Thorpe’s research has focused on the development of outdoor robotic vehicles, concentrating on computer vision, sensing, planning and architectures for these machines. Explain the following Linux commands: (1) ls –a (2) chmod +x foo (3) find . –name “*.java” Answer The founding director of the Robotics Institute is Professor Raj Reddy who was recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser University Professor of Computer Science and Robotics. You learnt about “ruby” when setting up your computers recently. What is ruby and what is it good for? Answer Ruby is a pure object-oriented scripting language, developed by Yukihiro Matsumoto in Japan. It was primarily designed to handle text processing and systems management tasks. The Ruby syntax will be familiar to anyone who has written in a scripting language such as Perl or PHP. However, unlike Perl or PHP, which require the use of a semi-colon as a line terminator, Ruby requires no line termination. Some developers may at first find themselves a little confused by this, but it can actually speed up development. What is “SourceForge” and why is it important? Answer SourceForge is the world's largest Open Source software development web site, hosting more than 100,000 projects and over 1,000,000 registered users with a centralized resource for managing projects, issues, communications, and code. SourceForge has the largest repository of Open Source code and applications available on the Internet, and hosts more Open Source development products than any other site or network worldwide. SourceForge provides a wide variety of services to projects they host, and to the Open Source community. Name a robot in each of the following categories: 1 leg, 2 legs, 4 legs, 6 legs, 8 legs Answer A 1-legged robots: Bow-legged hopper. A 2-legged (biped) robot: SONY Qrio. A 4-legged (quadruped) robot: SONY AIBO. A 6-legged (hexapod) robot: RHex. An 8legged robot: Dante I (or Dante II). NETWORK DEVICES: Repeater: Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link. Bridges: These operate both in the physical and data link layers of LANs of same type. They divide a larger network in to smaller segments. They contain logic that allow them to keep the traffic for each segment separate and thus are repeaters that relay a frame only the side of the segment containing the intended recipent and control congestion. Routers: They relay packets among multiple interconnected networks (i.e. LANs of different type). They operate in the physical, data link and network layers. They contain software that enable them to determine which of the several possible paths is the best for a particular transmission. Gateways: They relay packets among networks that have different protocols (e.g. between a LAN and a WAN). They accept a packet formatted for one protocol and convert it to a packet formatted for another protocol before forwarding it. They operate in all seven layers of the OSI model. Switches (L2) -------It breaks collasion domain.Uses MAC address to communicate. Faster than bridges. Router- routtes between differnet network.it take routing decision by refering routing table and therefore it is also called as layer 3 device. switch-switches within same subnet.it refers mac table for forwarding decions so it is called as a layer 2 device. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. Answer: B 2. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion Answer: A 3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Answer: B 4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Answer: A 5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Answer: C 6. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Answer: C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. A. POS B. RFID C. PPS D. GPS Answer: B 8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Answer: A 9. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Answer: A 10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Answer: A 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Answer: D 12. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information Answer: D 13. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Answer: B 14. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store Answer: B 15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered: A. data. B. output. C. input. D. the process. Answer: B 16. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Answer: C 17. Computers process data into information by working exclusively with: A. multimedia. B. words. C. characters. D. numbers. Answer: D 18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of: A. eight bytes. B. eight kilobytes. C. eight characters. D. eight bits. Answer: D 19. The term bit is short for: A. megabyte. B. binary language. C. binary digit. D. binary number. Answer: C 20. A string of eight 0s and 1s is called a: A. megabyte. B. byte. C. kilobyte. D. gigabyte. Answer: B 21. A ____________ is approximately one billion bytes. A. kilobyte B. bit C. gigabyte D. megabyte Answer: C 22. A ____________ is approximately a million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte Answer: C 23. ____________ is any part of the computer that you can physically touch. A. Hardware B. A device C. A peripheral D. An application Answer: A 24. The components that process data are located in the: A. input devices. B. output devices. C. system unit. D. storage component. Answer: C 25. All of the following are examples of input devices EXCEPT a: A. scanner. B. mouse. C. keyboard. D. printer. Answer: D 26. Which of the following is an example of an input device? A. scanner B. speaker C. CD D. printer Answer: A 27. All of the following are examples of storage devices EXCEPT: A. hard disk drives. B. printers. C. floppy disk drives. D. CD drives. Answer: B 28. The ____________, also called the “brains― of the computer, is responsible for processing data. A. motherboard B. memory C. RAM D. central processing unit (CPU) Answer: D 29. The CPU and memory are located on the: A. expansion board. B. motherboard. C. storage device. D. output device. Answer: B 30. Word processing, spreadsheet, and photo-editing are examples of: A. application software. B. system software. C. operating system software. D. platform software. Answer: A 31. ____________ is a set of computer programs used on a computer to help perform tasks. A. An instruction B. Software C. Memory D. A processor Answer: B 32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together. A. management B. processing C. utility D. application Answer: D 33. The PC (personal computer) and the Apple Macintosh are examples of two different: A. platforms. B. applications. C. programs. D. storage devices. Answer: A 34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. A. languages B. methods C. CPUs D. storage devices Answer: C 35. Servers are computers that provide resources to other computers connected to a: A. network. B. mainframe. C. supercomputer. D. client. Answer: A 36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. A. supercomputers B. clients C. laptops D. mainframes Answer: D 37. ____________ are specially designed computers that perform complex calculations extremely rapidly. A. Servers B. Supercomputers C. Laptops D. Mainframes Answer: B 38. DSL is an example of a(n) ____________ connection. A. network B. wireless C. slow D. broadband Answer: D 39. The difference between people with access to computers and the Internet and those without this access is known as the: A. digital divide. B. Internet divide. C. Web divide. D. broadband divide. Answer: A 40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale. A. Nanotechnology B. Micro-technology C. Computer forensics D. Artificial intelligence Answer: A 41. Which of the following is the correct order of the four major functions of a computer? A. Process à Output à Input à Storage B. Input à Outputà Process à Storage C. Process à Storage à Input à Output D. Input à Process à Output à Storage Answer: D 42. ____________ bits equal one byte. A. Eight B. Two C. One thousand D. One million Answer: A 43. The binary language consists of ____________ digit(s). A. 8 B. 2 C. 1,000 D. 1 Answer: B 44. A byte can hold one ____________ of data. A. bit B. binary digit C. character D. kilobyte Answer: C 45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. A. The platform B. The operating system C. Application software D. The motherboard Answer: B 46. The operating system is the most common type of ____________ software. A. communication B. application C. system D. word-processing software Answer: C 47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat. A. Servers B. Embedded computers C. Robotic computers D. Mainframes Answer: B 48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called: A. instructions. B. the operating system. C. application software. D. the system unit. Answer: A 49. The two broad categories of software are: A. word processing and spreadsheet. B. transaction and application. C. Windows and Mac OS. D. system and application. Answer: D 50. The metal or plastic case that holds all the physical parts of the computer is the: A. system unit. B. CPU. C. mainframe. D. platform. Answer: A Fill in the Blank: 51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation. Answer: Mac 52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices. Answer: operating system 53. The type of operating system software you use depends on your computer’s ____________. Answer: platform 54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet. Answer: Application 55. ____________are the fastest and most expensive computers. Answer: Supercomputers 56. A ____________ is approximately 1,000 bytes. Answer: kilobyte 57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________. Answer: instructions 58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information. Answer: stores 59. The binary language consists of two digits: ____________ and ____________. Answer: 0 and 1 60. A string of ____________ 0s and 1s is called a byte. Answer: eight (8) 61. The devices you use to enter data into a computer system are known as ____________ devices. Answer: input 62. The devices on a computer system that let you see the processed information are known as ____________ devices. Answer: output 63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks. Answer: Software 64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP). Answer: Internet 65. ____________ are computers that excel at executing many different computer programs at the same time. Answer: Mainframes 66. ____________is the application of computer systems and techniques to gather legal evidence. Answer: Computer forensics 67. ____________ is the science that attempts to create machines that will emulate the human thought process. Answer: Artificial intelligence (AI) 68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system. Answer: Microsoft Windows 69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns. Answer: data mining 70. Hard disk drives and CD drives are examples of ____________ devices. Answer: storage 71. You would use ____________ software to create spreadsheets, type documents, and edit photos. Answer: application 72. ____________ are computers that support hundreds or thousands of users simultaneously. Answer: Mainframes 73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating. Answer: Identity theft 74. Surgeons are using ____________ to guide robots to perform delicate surgery. Answer: computers 75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans. Answer: simulators True and False 76. Currently, the performance of tasks by robots is based on preprogrammed algorithms. Answer: True 77. Data can be a number, a word, a picture, or a sound. Answer: True 78. Strictly defined, a computer is a data processing device. Answer: True 79. The discrepancy between the “haves†and “have-nots― with regard to computer technology is commonly referred to as the digital society. Answer: False (digital divide) 80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security. Answer: True 81. Trend-spotting programs, developed for business, have been used to predict criminal activity. Answer: True 82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work. Answer: False 83. Clicking on an icon with the mouse is a form of giving an instruction to the computer. Answer: True 84. Output devices store instructions or data that the CPU processes. Answer: False (memory) 85. The CPU and memory are located on a special circuit board in the system unit called the motherboard. Answer: True 86. Nanostructures represent the smallest human-made structures that can be built. Answer: True 87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible, whereas mainframes are designed to handle many programs running at the same time (but at a slower pace). Answer: True 88. Being computer fluent means that you should be able to build a computer yourself. Answer: False 89. Embedded computers are self-contained computer devices that have their own programming and do not receive input. Answer: True 90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network. Answer: False (network adapter) 91. With a wireless network, it is easier to relocate devices. Answer: True 92. The most common type of memory that the computer uses to process data is ROM. Answer: False (RAM) Why the document you created at home displays with a different font at school? Because you have a different printer at school than at home Because you have a different monitor at school than at home font you used at home is not installed on your school computer Because the version of Windows is different 2. Which keyboard shortcut centers selected text? Ctrl+C Alt+C There is no keyboard shortcut for this operation Ctrl+E 3. What is the default file extension for all Word documents? TXT WRD FIL DOC 4. Which key moves your cursor from one cell to the next in a table? Tab Shift Enter Ctrl+Enter 5. How many different documents can you have open at one time? No more that three Only one As many as your computer memory will hold No more than your Taskbar can display 6. In order to email a Word document from within Word: Go to File/Send To/Mail Recipient Save the file as an email attachment Start Outlook and attach the file while open in Word. This is an impossible operation 7. Which keystroke will take you at the beginning or the end of a long document? Ctrl+PageUp and Ctrl+PageDown Shift+Home and Shift+End Ctrl+Home and Ctrl+End The only way is by using the right scroll bar 8. How many margins are on a page? Two (header and footer) Four (top, bottom, right, left) Two (landscape and Portrait) Two (top and bottom) 9.In order to save a Word document as a web page you need to: Put the appropriate graphics and links on the document Save the document in simple text format Use your web browser as an editor and save as URL Save as HTML 10. A document in portrait prints: The same characters per line with the same document in landscape More characters per line than the same document in landscape Less characters per line than the same document in landscape Smaller fonts in order to fit the same amount of characters per line with landscape 1. ------- is associated with web services. a) WSDL b) WML c) web sphere d) web logic Ans: a 2.any large single block of data stored in a database, such as a picture or sound file, which does not include record fields, and cannot be directly searched by the database’s search engine. a) TABLE b) BLOB c) VIEW d) SCHEME Ans: b 3.A reserved area of the immediate access memory used to increase the running speed of the computer program. a) session memory b) bubble memory c) cache memory d) shared memory Ans: c 4.a small subnet that sit between a trusted internal network and an untruster external network, such as the public internet. a) LAN b) MAN c) WAN d) DMZ Ans: d 5.technologies that use radio waves to automatically identify people or objects,which is very similar to the barcode identification systems,seen in retail stores everyday. a) BLUETOOTH b) RADAR c) RSA SECURE ID d) RFID Ans: d 6.main(){ float fl = 10.5; double dbl = 10.5 if(fl ==dbl) printf(“UNITED WE STAND”); else printf(“DIVIDE AND RULE”) } What is the output? a) compilation error b) UNITED WE STAND c) DIVIDE AND RULE d) Linkage error. Ans: c 7.main(){ static int ivar = 5; printf(“%d”,ivar--); if(ivar) main(); } What is the output? a)1 2 3 4 5 b) 5 4 3 2 1 c)5 d) Compiler error:main cannot be recursive function. Ans: b 8.main() { extern int iExtern; iExtern = 20; printf(“%d”,iExtern); } What is the output? a)2 b) 20 c) compile error d) linker error Ans: d 9..#define clrscr() 100 main(){ clrscr(); printf(“%d\n\t”, clrscr()); } What is the output? a)100 b)10 c)compiler errord)linkage error Ans: a 10.main() { void vpointer; char cHar = ‘g’, *cHarpointer = “GOOGLE”; int j = 40; vpointer = &cHar; printf(“%c”,*(char*)vpointer); vpointer = &j; printf(“%d”,*(int *)vpointer); vpointer = cHarpointer; printf(“%s”,(char*)vpointer +3); } What is the output? a) g40GLE b) g40GOOGLE c) g0GLE d) g4GOO Ans: a 11.#define FALSE -1 #define TRUE 1 #define NULL 0 main() { if(NULL) puts(“NULL”); else if(FALSE) puts(“TRUE”); else puts(“FALSE”); } What is the output? a) NULL b) TRUE c) FALSE d)0 Ans: b 12.main() { int i =5,j= 6, z; printf(“%d”,i+++j); } What is the output? a)13 b)12 c)11 d) Compiler error Ans: c 13.main() { int i ; i = accumulator(); printf(“%d”,i); } accumulator(){ _AX =1000 } What is output? a)1 b)10 c)100 d)1000 Ans: d 14.main() { int i =0; while(+(+i--)!= 0) i- = i++; printf(“%d”,i); } What is the output? a) -1 b) 0 c) 1 d) Will go in an infinite loop Ans: a 15.main(){ int i =3; for(; i++=0;) printf((“%d”,i); } What is the output? a) 1 b) 2 c) 1 2 3 d) Compiler error : L value required. Ans: d 16. main(){ int i = 10, j =20; j = i ,j?(i,j)?i :j:j; printf(“%d%d”,i,j); } What is the output? a) 20 20 b) 20 10 c) 10 20 d) 10 10 Ans: d 17.main(){ extern i; printf(“%d\t”,i);{ int i =20; printf(“%d\t”,i); } } What is the output? a) “Extern valueof i “ 20 b) Externvalue of i” c) 20 d) linker Error: unresolved external symbol i Ans: d 18.int DIMension(int array[]){ return sizeof(array/sizeof(int);} main(){ int arr[10]; printf(“Array dimension is %d”,DIMension(arr)); } What is output? a) array dimension is 10 b) array dimension is 1 c) array dimension is 2 d) array dimension is 5 Ans: b 19. main(){ void swap(); int x = 45, y = 15; swap(&x,&y); printf(“x = %d y=%d”x,y); } void swap(int *a, int *b){ *a^=*b, *b^=*a, *a^ = *b; What is the output? a) x = 15, y =45 b) x =15, y =15 c) x =45 ,y =15 d) x =45 y = 45 Ans: a 20.main(){ int i =257; int *iptr =&i; printf(“%d%d”,*((char*)iptr),*((char *)iptr+1)); } What is output? a)1, 257 b)257 1c)0 0d)1 1 Ans: d 21.main(){ int i =300; char *ptr = &i; *++ptr=2; printf(“%d”,i); } What is output? a) 556 b) 300 c) 2 d) 302 Ans: a 22.#include main(){ char *str =”yahoo”; char *ptr =str; char least =127; while(*ptr++) least = (*ptr printf(“%d”,least); } What is the output? a) 0 b)127 c) yahoo d) y Ans: a 23.Declare an array of M pointers to functions returing pointers to functions returing pointers to characters. a) (*ptr[M]()(char*(*)()); b) (char*(*)())(*ptr[M])() c) (char*(*)(*ptr[M]())(*ptr[M]() d) (char*(*)(char*()))(*ptr[M])(); 24.void main(){ int I =10, j=2; int *ip = &I ,*jp =&j; int k = *ip/*jp; printf(“%d”,k); } What is the output? a) 2 b) 5 c) 10 d) compile error:unexpected end of file in comment started in line 4 Ans: d 25.main(){ char a[4] =”GOOGLE”; printf(“%s”,a); } What is the output? a) 2 b) GOOGLE c) compile error: yoo mant initializers d) linkage error. Ans: c 26.For 1MB memory, the number of address lines required a) 12 b) 16 c) 20 d) 32 Ans: 16 27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output. a) AND b) OR c) XOR d) NAND Ans: b (not sure) 28. What is done for push operation a) SP is incremented and then the value is stored. b) PC is incremented and then the value is stored. c) PC is decremented and then the value is stored. d) SP is decremented and then the value is stored. Ans: d 29.Memory allocation of variables declared in a program is: a) Allocated in RAM b) Allocated in ROM c) Allocated in stack d) Assigned in registers. Ans: c 30.What action is taken when the processer under execution is interrupted by TRAP in 8085MPU? a) Processor serves the interrupt request after completing the execution of the current instruction. b) processer serves the interrupt request after completing the current task. c) processor serves the interrupt immediately. d) processor serving the interrupt request depent deprnds upon the priority of the current task under execution. Ans: a 31.purpose of PC (program counter)in a microprocessor is: a) To store address of TOS(top of stack) b) To store address of next instructions to be executed c) count the number of instructions d) to store the base address of the stack. Ans: b 32.conditional results after execution of an instruction in a microprocess is stored in a) register b) accumulator c) flag register d) flag register part of PSW (program status word) Ans: c 33.The OR gate can be converted to the NAND function by adding----gate(s)to the input of the OR gate. a) NOT b) AND c) NOR d) XOR Ans: a 34. In 8051 microcontroller , has a dual function. a) port 3 b) port 2 c) port 1 d) port 0 Ans: b 35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following chunk of code with how much delay? MVI B,38H HAPPY: MVI C, FFH SADDY: DCR C JNZ SADDY DCR B JNC HAPPY a) 102.3 b)114.5 c)100.5 d)120 36.In 8085 MPU what will be the status of the flag after the execution of the following chunk of code. MVI B,FFH MOV A,B CMA HLT a) S = 1, Z = 0, CY = 1 b) S = 0, Z = 1, CY = 0 c) S = 1, Z = 0, CY = 0 d) S = 1, Z = 1 ,CY = 1 37.A positive going pulse which is always generated when 8085 MPU begins the machine cycle. a) RD b) ALE address latch enable… c) WR d) HOLD Ans: b 38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed in the W and Z registers. a) JMP b) STA c) CALL d) XCHG Ans: c 39.what is defined as one subdivision of the operation performed in one clock period. a) T- State b) Instruction Cycle c) Machine Cycle d) All of the above Ans: a 40.At the end of the following code, what is the status of the flags. LXI B, AEC4H MOV A,C ADD HLT a) S = 1, CY = 0, P = 0 , AC = 1 b) S =0 , CY = 1, P = 0,AC = 1 c) S = 0, CY = 1, P = 0 , AC = 1 d) S = 0, CY = 1, P = 1 , AC = 1 41.In 8051 micro controller what is the HEX number in the accumulator after the execution of the following code. MOV A,#0A5H CLR C RRC A RRC A RL A RL A SWAP A a)A6 b)6A c)95 d)A5. Ans: a 42.The Pentium processor requires ------------ volts. a)9 b)12 c)5 d)24 ans; c 43. The data bus on the Celeron processor is-------bits wide. a)64 b)32 c)16 d)128. Ans: a 44.K6 processor a) Hitachi b) toshiba c) zilog d) AMD. Ans: d 45. What is the control word for 8255 PPI,in BSR mode to set bit PC3. a)0EH b)0FH c)07H d)06H. ans:c 46.The repeated execution of a loop of code while waiting for an event to occur is called --------.The cpu is not engaged in any real productive activity during this period,and the process doesn’t progress towards completion. a) dead lock b) busy waiting c) trap door d) none. Ans: b 47. Transparent DBMS is defined as a) A DBMS in which there are no program or user access languages. b) A DBMS which has no cross file capabilities but is user friendly and provides user interface management. c) A DBMS which keeps its physical structure hidden from user d) none. Ans: c 48.Either all actions are carried out or none are. users should not have to worry about the effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete transctions.this property is known as a) Aggregation b) atomicity c) association d) data integrity. ans : B… 49.------ algorithms determines where in available to load a program. common methods are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one process (or part of a process) needs to be swaped out to accommodate a new program.The ------------- algorithm determines which are the partions to be swaped out. a) placement, placement, replacement b) replacement, placement, placement c) replacement, placement, replacement d) placement, replacement, replacement Ans: D 50.Trap door is a secret undocumented entry point into a program used to grant access without normal methods of access authentication. A trap is a software interrupt,usually the result of an error condition. a)true b)false. Ans: A 51. Given a binary search tree,print out the nodes of the tree according t5o post order traversal. 4 /\ 25 /\ 13 a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. Ans: C 52.which one of the following is the recursive travel technique. a)depth first search b)preorder c)breadth first search d)none. 53.which of the following needs the requirement to be a binary search tree. a) 5 /\ 27 / 1 b) 5 /\ 67 c) 5 /\ 27 /\ 16 d) none. 54.in recursive implementations which of the following is true for saving the state of the steps a) as full state on the stack b) as reversible action on the stack c) both a and b d) none 55.which of the following involves context switch a)previliged instruction b)floating point exception c)system calls d)all e)none ans : c 56.piggy backing is a technique for a)acknowledge b)sequence c)flow control d)retransmission ans:A 57. a functional dependency XY is ___________dependency if removal of any attribute A from X means that the dependency does not hold any more a)full functional b) multi valued c)single valued d)none ans : a 58)a relation schema R is in BCNF if it is in ___________and satisfies an additional constraints that for every functional dependency XY,X must be a candidate key a)1 NF b)2 NF c)3 NF d)5 NF 59) a _________sub query can be easily identified if it contains any references to the parent sub query columns in the _________ clause A) correlated ,WHERE b) nested ,SELECT c) correlated,SELECT d) none 60) hybrid devise that combines the features of both bridge and router is known as a)router b)bridge c)hub d)brouter 61) which of the following is the most crucial phase of SDLC a)testing b)code generation c) analysys and design d)implementation Ans: c 62)to send a data packet using datagram ,connection will be established a)no connection is required b) connection is not established before data transmission c)before data transmission d)none Ans: c 63)a software that allows a personal computer to pretend as as computer terminal is a) terminal adapter b)terminal emulation c)modem d)none Ans: b 64) super key is a) same as primary key b) primary key and attribute c) same as foreign key d) foreign key and attribute Ans: b 65.In binary search tree which traversal is used for ascending order values a) Inorder b)preorder c)post order d)none Ans: a 66.You are creating an index on ROLLNO colume in the STUDENT table.which statement will you use? a) CREATE INDEX roll_idx ON student, rollno; b) CREATE INDEX roll_idx FOR student, rollno; c) CREATE INDEX roll_idx ON student( rollno); d) CREATE INDEX roll_idx INDEX ON student (rollno); Ans: c 67.A________class is a class that represents a data structure that stores a number of data objects a. container b.component c.base d.derived Ans: a 68.Which one of the following phases belongs to the compiler Back-end. a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation. Ans: c 69.Every context _sensitive language is context_free a. true b.false Ans: b 70.Input:A is non-empty list of numbers L Xß-infinity For each item in the list L,do If the item>x,then Xß the item Return X X represents:a)largest number b)smallest number c)smallest negative number d) none 71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy the following conditions a)key(A)>=key(B) b)key(A) c)key(A)=key(B) d)none 72.String ,List,Stack,queue are examples of___________ a)primitive data type b)simple data type c)Abstract data type d)none Ans: c 73.which of the following is not true for LinkedLists? a)The simplest kind of linked list is a single linked list ,which has one link per node .this link points to the next node in the list,or to a null value or emptylist if it is the last node. b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist .Each node has two links ,one to the previous node and one to the next node. c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only for double linked list. d) to traverse a circular linkedlist ,u begin at any node and follow the list in either direction until u return to the original node. Ans: c 74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store the data a) true b) false Ans:a 1. Do u know abt Recursive functions?? YES. Then write a recursive function to display Fibonacci series. 2. Fibonacci using normal loops and conditional statements. 3. Wat do u mean by scope of variables?? 4. Then He gave me a program where one was a global, one was extern and so on and he asked me the o/p. 5. Write an algorithm to add a node to a linked list using pointers: i) at the start, ii) at the end, iii) in the middle. 6. Wat do u mean by Dynamic memory allocation? 7. Wat is the difference between Malloc and Calloc?? 8. Syntax for malloc while initializing a node in linked list 9. How do u use malloc to initialize an array? 10.Wat is the difference between C and C++? 11. An array of numbers from 1 to 100. random selection of 99 numbers. write an efficient algorithm to find the unselected number. 12.These and some basic questions based on strings lik strlen, strcmp, concatenating of strings. 13. He gave me a program where an array of size 10 was initialized, a string of size 6 was input and after concatenating another string of size6 wats the o/p? Computers General knowledge Questions and answers Where are files and websites on the internet stored? Ans:The internet is a collection of a large number of client-server based systems. So all files and other resources on it are stored on secondary storage devices of the respective servers. Servers of websites are termed as web servers. So when you type in a URL of a website in the address bar of your browser, it makes a connection to that web server which in turn fetches the data from the secondary storage device (such as the hard disk) that they must be using and returns it to the respective browser. The same holds true for any other resource (image, MP3 file, zipped file, etc.) that you access on the internet. 2 Who invented the QWERTY keyboard? Ans: QWERTY keyboard (also known as universal keyboard) is used in modern computers. The name QWERTY comes from the first six letters in the top row. It was invented by C L Sholes in 1872. 3 What is the full form of TFT in computer and mobile screens? Ans: Thin Film Transistor (TFT) is a type of LCD flat-panel display screen. It’s called so because each pixel is controlled by transistors. TFT technology provides the best resolution of all the flat-panel technologies, but it is also the most expensive. TFT displays are usually designed to run at a specific resolution. 4 What does the term ‘screen slave’ mean? Ans: Screen slaves refers to people who are abnormally addicted to the computer. For example, screen slaves would communicate via e-mail with people sitting right next to them. The screen slave culture, which is particularly rampant in offices the world over, is adding to the sedentary lifestyle of white collar workers, thereby increasing related disorders such as obesity, heart disease and Repetitive Stress Injury. 5 What is a TFT monitor? Ans: Thin Film Transistor (TFT) Liquid Crystal Display technology does away with the traditional bulky Cathode Ray Tube (CRT). LCDs use a strong backlight as the light source and control how much of this light is allowed to reach the dots (pixels) by selectively allowing the light to reach each pixel. LCDs achieve this by taking advantage of a key property of ‘twisted’ liquid crystal molecules; their ability to naturally block polarised light but then let it through by degrees when a small electric field is applied. LCD cells are accurately controlled and arranged in a flat matrix of rows and columns. 6 What is a ‘firewall’ in computer terminology? Ans: In computer security, a firewall is a device that blocks unauthorised access to an organisation’s local area network. A firewall can reside on the administrative computer, the server that acts as the LAN’s gateway to the Internet. The firewall keeps track of every file entering or leaving the local area network in order to detect the source of viruses and other problems that might enter the network. 7 What is a handshake in computers? Ans: Handshake is the process by which two computers initiate communication. A handshake begins when one sends a message to another indicating that it nature of quantum mechanics and space and time. In String Theory, all forces and particles emerge in an elegant geometrical way, realising Einstein’s dream of building everything from the geometry of space-time. 8 What is utility computing? Ans: Utility computing is a service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate. Like other types of on-demand computing (such as grid computing), the utility model seeks to maximise the efficient use of resources and/ or minimise associated costs. 9 What is the difference between an inverter and a UPS? Ans: Practically, both are same. An inverter converts DC power supply into AC supply. A UPS (Uninterupted Power Supply) is an electronic device which uses inverter technology in it. UPS uses AC supply when power is there, converts into DC power and stores it. This DC power is converted back to AC supply and provides stand by power when electricity goes off. 10 What is e-waste? Ans: All obsolete electronic devices such as computers, servers, printers, monitors, TVs, cellphones, calculators, CDs, floppies, chips, processors, motherboard, PCB etc. end up as e-waste. E-waste contains many hazardous substances like PVC, plastics, heavy metals, Brominated Flame Retardants etc. Computer-Related Abbreviations and Acronyms. A A-D Analog to Digital AA Author's Alteration AA Auto Answer AAL5 ABEND ATM Adaption Layer 5 Abnormal End ABI Application Binary Interface ABR Available Bit Rate AC97 Audio Codec 97 ACB ACDS Access method Control Block Active Control Data Set ACE Asynchronous Communications Element ACF Advanced Communication Facility ACIA Asynchronous Communications Interface Adapter ACK Acknowledge ACS Asynchronous Connection Server ACS Automatic Class Selection ACSE Application Control Service Element ACT Application Control Table ACU Automatic Calling Unit ADC Analog Digital Converter ADDMD Administrative Directory Management Domain ADMD Administrative Management Domain ADO ActiveX Data Object ADSL Asymetric Digital Subscriber Line AEA Activity End Acknowledge AEI Application Entity Invocation AF Application Framework AFP Advanced Function Printing AGP Accellerated Graphics Port AGS AI Advanced Graphics System Artificial Intelligence AIU Application Interface Unit AIX Advanced Interactive eXecutive AIX Alternate IndeX ALGOL ALGOrithmic Language ALS Application Layer Structure ALS Automatic Line Switching ALT Application Load Table ALU Arithmetic and Logic Unit AM Access Method AMH Automated Material Handling AMI Alternate Mark Inversion AMIS Audio Messaging Interchange Specification AMR Audio Modem Riser AMS Access Method Services ANR Automatic Network Routing ANS Advanced Network Services ANSI American National Standards Institute AOCE Apple Open Collaboration Environment AOW Asian and Oceanic Workshop for open systems AP Access Point AP Automation Protocol APA APDU API APIA APL All Points Addressable Application Protocol Data Unit Application Programming Interface API Association A Programming Language APPC Advanced Program-to-Program Communication APPI Advanced Peer-to-Peer Internetwork(ing) APPN APS AR ARP Advanced Peer-to-Peer Network(ing) Advanced Production System Attention Routine Address Resolution Protocol ARPA Advanced Research Projects Agency ARPANET Advanced Research Projects Agency Network ARU Audio Response Unit AS Activity Start AS Autonomous System ASC Accredited Standards Committee ASCII American Standard Code for Information Interchange ASE Application Service Element ASIC Circuit Application-Specific Integrated ASN Abstract Syntax Notation ASN.1 Abstract Syntax Notation One ASO Application Service Object ASP Active Server Pages ASR Automatic Speech Recognition ASTs Asynchronous System Traps AT Advanced Technology ATM Adobe Type Manager ATM Asynchronous Transfer Mode ATM ATMP ATSF AU AVR AWG Automatic Teller Machine Ascend Tunnel Management Protocol Alert Transport Service Facility Access Unit Automatic Volume Recognition American Wire Gauge B B8ZS Binary Eight Zero Substitution BABT British Approvals Board for Telecommunications BAL Business Application Language BAM Basic Access Methods BAS Basic Activity Subset BASH Bourne-Again SHell BASIC Beginners All-Purpose Symbolic Instruktion Code BBS Bulletin Board System BCC Block Check Character BCD Binary Coded Decimal BCF Bridge Control Facility BCPL Basic Combined Programming Language BCS Basic Catalog Structure BCS Basic Combined Subset BDAM Basic Direct Access Method BDR Basic Density Range BEL Bell BER Bit Error Rate BES Bursty Errored Seconds BG BackGround BHT Branch History Table BIOS Basic Input/Output System BIS BISYNC BIT BITNIC Business Information System Binary Synchronous Communication Binary Digit Bitnet Network Information Center BLOB Binary Large Object BMIC Bus Master Interface Controller BMP BitMaP BMS Basic Mapping Support BNN Boundary Network Node BOC Bell Operating Companies BOT Begin Of Tape BP BPAM Base Pointer Basic Partitioned Access Method BPI Bytes Per Inch BPS Bites Per Second BRA Basic Rate Access BRI Basic Rate Interface BS Backspace / British Standard BSA BSAM Basic Service Area Basic Sequential Access Method BSC Binary Synchronous Communication BSD Berkeley Software Distribution BSDS BootStrap Data Set BSI British Standards Institute BSS Basic Synchronous Subset BTAC Branch Target Address Cache BTAM Basic Teleprocessing Access Method BTA-ES Basic Teleprocessing Access Method - Extended Storage BYP Bypass C CA Collision Avoidance CA... Computer Aided ... CAA Computer Aided Architecture CAD Computer Aided Design CADD Computer Aided Design and Drafting CADIS System Computer Aided Design Interactive CAE Common Application Environment CAE Computer Assisted Education, Computer Aided Engineering = CAD + CAP + CAQ CAH Computer Aided Handling CAI CAO Computer Aided Instruction = CIM + CAISE Computer Aided Integrated Software Engineering CALS Computer Aided Acquisition and Logistic Support CAM Computer Aided Manufacturing / Content Adressable Memory CAMAC Control Computer Automated MeAsurement CAN Cancel CAO Computer Aided Office CAP Computer Aided Planning / Computer Aided Publishing CAPP Computer Aided Production Planning CAPPC Computer Aided Production Planning and Control CAPSC Computer Aided Production Scheduling and Control CAQ Computer Aided Quality Assurance CAR Computer Aided Roboting CAR Computer Assisted Radiology CAS Computer Aided Selling CASE Common Application Service Elements CASE Computer Aided SoftwareEngineering CAT Computer Aided Testing CATV CAble TeleVision CBDS Service Connectionless Broadband Data CBEMA Computer and Business Equipment Manufacturers' Association CBR Constant Bit Rate CBT Computer Based Training CCD Charge-Coupled Device CCETT Centre Commun d'Etudes de Telediffusion et Telecommunications CCIR International Radio Consultative Committee CCITT Comite Consultatif International Telegraphique et Telephonique CCR Committment, Concurrency and Recovery CCS Common Communication Support CCTA Central Computer and Telecommunications Agency CCU CCW CD Communication Control Unit Channel Command Word Collision Detection CD Compact Disk CDB Command Descriptor Block CDC Century Date Change CDDA Compact Disk - Digital Audio CDDI Copper Data Distribution Interface CDE Common Desktop Environment CDG Compact Disk - Graphic CDI Compact Disk Interactive CDMA Code Division Multiple Access CDPD Cellular Digital Packet Data CDR CDROM Copy Density Range Compact Disk ROM CDTV Commodore Total Vision CDXA Copmact Disk eXtended Architecture CEC Commission of European Communities CEFIC Conseil Européen des Federations de l'Industrie Chimique CELP Code Excited Linear Prediction CEN Comité Européen de Normalisation CENELEC Comité Européen de Normalisation Electrotechnique CEO Comprehensive Electronic Office CEPT Conference Européenne des Administrations des Postes et des Telecommunications CERN Conseil Européen pour la Recherche Nucléaire CF Call Forwarding CF Carry Flag CF Control Function CFV Call For Votes CGA Colour Graphics Adapter CGI Common Gateway Interface CGI Computer Graphics Interface CGM Computer Graphics Metafile CHAP Protocol Challenge-Handshake Authentication CHL-I CHanneL Interface CHPID CI CHannel Path IDentifier Computer Interconnect CI Control Interval CIAM Computer Integrated and Automated Manufacturing CIB CICS Computer Integrated Business Customer Information Control System CID Configuration, Installation and Distribution CIF Cells In Frames CIF Common Intermediate Format CIF CIM Computer Integrated Factory = CIO + CIM Computer Input by Microfilm CIM Computer Integrated Manufacturing = PPS + CAE + CAM CIO Computer Integrated Office CIR Committed Information Rate CIS Card Information Structure CISC Complex (Complete) Instruction Set Computer CIT Computer Integrated Telephony CIV Conversation Verb Interface CKD Count Key Data CL Core Image Library CL Connectionless CLI Call Level Interface CLIM Compaq/Lotus/Intel/Microsoft CLNS Connectionless Network Service CM/2 Communication Manager / 2 CMC Communication Management Configuration CMEA Council for Mutual Economic Assistance CMIP Protocol Common Management Information CMIS Service Common Management Information CMOS System Cellular Management Operation CMOS Complimentary Metal Oxide Semiconductor CMOT Common Management Information Protocol (CMOT) Over TCP/IP CMR Communications Resource Manager CMS CMYK CN CNC CNLP Conversational Monitor System Cyan, Magenta, Yellow, Black Corporate Network Computerized Numerical Control Connectionless Network Protocol CNM Communication Network Management CNMA Communication Network for Manufacturing Applications CNR Carrier-to-Noise-Ratio COBOL COmmon Business Oriented Language COCOM Coordinating Comittee on Multilateral Export Controls CODASYL COnference on DAta SYstems Languages Codec Coder/Decoder COFF Common Object File Format COM Common Object Model COM Computer Output on Microfilm COMAL COMmon Algorithmic Language COMREG CONS Service Communication Region Connection-Oriented Network CORBA Common Object Request Broker Architecture COS COSE COSINE Europe COSS CP CP-SVR Corporation for Open Systems Common Open Software Environment Cooperation for OSI Networking in Cross Operating System Service Control Program Control Point to Server CP/M Control Program/Monitor (for Microcomputer) CPE Customer Premises Equipment CPI Characters Per Inch CPI Common Programming Interface CPI Computer to PABX Interface CPIC Common Programming Interface for Communications CPL Current Privilege Level CPR Computerized Patient Record CPS Characters Per Second CPU Central Processing Unit CR Carriage Return CR Communication Region CRC Cyclic Redundancy Check CRJE Conversational Remote Job Entry CRS Computer Reservation System CRS Configuration Report Server CRT Cathode Ray Tube CS Communications Server CSA Common System Area CSC Cross System Consistency CSDN Circuit Switched Data Network CSECT Control Section CSI CSLIP Consolidated Software Inventory Compressed SLIP CSMA/CA Carrier Sense Multiple Access with Collision Avoidance CSMA/CD Carrier Sense Multiple Access with Collision Detection CSP Control Sequence Prefix CSP Cross System Product CSPDN Network Circuit Switched Public Data CSS Cascading Style Sheet CST Computer Supported Telephony CSU Channel Service Unit CSU/DSU Channel Service Unit / Data Service Unit CT Continuous Tone CT2T Continuous Tone To Tape CTC Channel To Channel CTC CICS To CICS CTS Clear To Send CTS Conformance Test System CTS-WAN WAN CU CUA Conformance Testing Services for Control Unit Common User Access CUT Control Unit Terminal CVOL Control VOLume CWS Coalition for Working Systems D D/A DA Digital/Analog Desk Accessory DAC Digital Analog Converter DAC Dual Attachment Concentrator DAI Distributed Artificial Intelligence DAM Direct Access Method DAP Directory Access Protocol DAP Document Application Profile DARPA Defense Advanced Research Projects Agency DAS DASD Dual Attachment Station Direct Access Storage Device DAT Digital Audio Tape DAT Dynamic Address Translation DB DBCS Database Double Byte Character Set DBMS DataBase Management System DBRT Directed Beam Refresh Terminal DC Data Cartridge DC Data Communication DCA DCAF Document Content Architecture Distributed Console Access Facility DCB Data Control Block DCB Disk Coprocessor Board DCC Diskette Controller Chip DCE Data Circuit terminating Equipment DCE Data Communications Equipment DCE Distributed Computing Environment DCI Display Control Interface DCL Digital Command Language DCS Desktop Color Separation DCT Destination Control Table DCT Discrete Cosine Transform DD Data Definition DDCMP Digital Data Communications Message Protocol DDCS Distributed Database Connecion Services/2 DDE Dynamic Data Exchange DDES Digital Data Exchange Specifications DDI Device Driver Interface DDK Driver Development Kit DDL Data Definition Language DDL Document Description Language DDM Distributed Data Management DDN Defense Data Network DDP Distributed Data Processing DDRM interface Device driver interface/Driver kernel Reference Manual DDS Dataphone Digital Service DDS Decision Support System DECT Digital European Cordless Telephone DECUS Society Digital Equipment Computer Users DEL Delete DES Data Encryption Standard DF DFC Direction Flag Distributed Coordination Function DFDSS Data Facility Data Set Services DFHSM Manager Data Facility Hierarchical Storage DFP Data Facility Product DFR Document Filing and Retrival DFS Distributed File System DFSMS Data Facility Storage Management Subsystem DFSORT DFT Data Facility Sort Distributed Function Terminal DFWMAC Distributed Foundation Wireless Media Access Control DHCP DHTML Dynamic Host Configuration Protocol Dynamic HTML DIA Document Interchange Architecture DIB Data Input Bus DIB Device Independent Bitmap DIFS Distributed coordination function InterFrame Space DIMM Dual Inline Memory Module DIP Dual Inline Package DIS Draft International Standard DISSOS Distributed Office Support System DIT Directory Information Tree DKI Driver Kernel Interface DL Data Length DL Directory Listing DL/1 Data Language 1 DLBL Disk Label DLCI Data Linc Connection Identifier DLE Data Link Escape DLL Dynamic Link Library DLS Device Level Selection DLSE Device Level Selection Enhanced DLSw Data Link Switching DLUR Dependent LU Requester DLUR/S DLUS Dependent LU Requester / Server Dependent LU Server DMA Direct Memory Access DMCI Direct Memory Communications Interface DMD Directory Management Domain DMI Digital Multiplexed Interface DML Data(base) Manipulation Language DMNL DMP DN Direct Multi Network Link Dot Matrix Printer Distinguished Name DNA Digital Network Architecture DNS Domain Name Service DOC Display Operator Console DOE Distributed Objects Everywhere DOMF Facility Distributed Object Management DOS Declaration Of Support DOS Disk Operating System DOS/VS Storage Disk Operating System / Virtual DOS/VSE Disk Operating System / Virtual Storage Extended DP Data Processing DP Draft Proposal DPA Document Printing Application DPF Data Private Facility DPI Dots Per Inch DPL Descriptor Privilege Level DPMS Display Power Management Signaling DPS Dynamic Path Selection DQDB Distributed Queue Dual Bus DRAM Dynamic Random Access Memory DRQ Data ReQuest DS Digit Select DS Directory System DSA Directory System Agent DSA Distributed Systems Architecture DSA Dynamic Storage Area DSF Device Support Facility DSL Direct Swift Link DSN DataSetName DSN DSNL DSOM Distributed Systems Network Direct Swift Network Link Distributed System Object Model DSP Digital Signal Processor DSP Directory System Protocol DSR Data Set Ready DSSI Digital Storage Systems Interconnect DSU Data Service Unit DTAM Document Transfer, Access and Manipulation DTD Document Type Definition DTE Data Terminal Equipment DTI (UK) Department of Trade and Industry DTP DeskTop Publishing DTR Data Terminal Ready DU Data Unit DUA Directory User Agent DUN Dispatch Unit Number DVI Digital Video Interface DVST DXI Direct View Bistable Storage Data eXchange Interface E E1 2,048 Mbps E3 34 Mbps EARN Network European Academic and Research EB Error Bell EB bytes) ExaByte (1,152,921,504,606846,976 EBAM Memory Electronic Beam-Addressable EBCD Extended Binary Coded Decimal EBCDIC Extended Binary Coded Decimal Interchange Code ECC Error Checking and Correction ECC Error Correction Code ECE Economic Commission for Europe ECF Enhanced Connectivity Facility ECITC European Committee fo IT Testing and Certification ECKD Extended Count-Key Data ECMA European Computer Manufacturers Association ECTUA European Counsil for Telecommunications Users Association EDC Enterprise Database Connectivity EDF Execution Diagnostic Facility EDG Electronic Dot Generation EDI Electronic Data Interchange EDICON EDI Community for the Construction Industry (UK) EDIF Electronic Design Interchange Format EDIFACT Electronic Data Interchange For Administration, Commerce and Transport EDIM EDIMS Electronic Data Interchange Message EDI Messaging System EDM Engineering Data Management EDP Electronic Data Processing EDR Early Device Release EEMA European Electronic Mail Association EFT Electronic Funds Transfer EGA Enhanced Graphics Adapter EGP Exterior Gateway Protocol EHLLAPI Emulator High Level Language Applications Programming Interface EIB Execute Interface Block EIP Execute Interface Program EISA Extended Industry Standard Architecture EIT Encoding Information Type EIUF European ISDN User Forum ELAN European LAN ELAN Extended LAN ELAN Emulated LAN EM End of Medium EMA Enterprise Management Architecture EMS Expanded Memory Specification EMUG EN ENE European MAP Users Group European Norme Enterprise Network Event ENP Enable Presentation ENQ Enquiry EO Eight Ones EOB End of Block EOC End of Cylinder EOF End of File EOJ End of Job EOP End of Procedure EOT End of Transmission EOV End of Volume EP EPDE Emulation Program Electronic Product Data Exchange EPOW Emergency Power Off Warning EPROM Memory Eraseable Programable Read Only EPS EPSF ER ERDS Encapsulated PostScript Encapsulated PostScript Format Entity Relationship Error Recording Data Set EREP Environmental Record Editing and Printing program ES Errored Second ESA Extended Service Area ESC Escape ESCON Enterprise System Connection Architecture ESD Electronic Software Distribution ESD External Symbol Dictionary ESDI Enhanced Small Device Interface ESDS Entry Sequenced Data Set ESF Extended SuperFrame ESPRIT European Strategic Programme for Research and development in Information Technology ESQA ETB Extended System Queue Area End of Transmission Block ETCOM European Testing and Certification for Office and Manufacturing protocols ETS European Telecommunication Standard ETSI European Telecommunication Standards Institute ETX End of Text EUnet European Unix Network EUUG European Unix User Group EVI EWOS Systems EXCP EZ EVent Information European Workshop for Open EXecute Channel Program Excessive Zeros F F/STP FA Foil STP Foreign Agent FAQ Frequently Asked Questions FAST Federation Against Software Theft FAT File Allocation Table FBA Fix Block Architecture FBA Fixed Blocked ANSI-defined printer control characters FBM FC Fix Block Modus File Control FCB Format Control Buffer FCP File Control Program FCS Frame-Check Sequence FCT File Control Table FDD Fixed Disk Drive FDDI Fiber Distributed Data Interface FEAL Fast Data Encipherment Algorithm FEP Front-End Processor FF Formfeed FH Frame Handler FIFO First In, First Out FIPS Federal Information Processing Standard FLOPS Floating-point operations per second FMLI Forms and Menu Language Interpreter FOB FOND Form Overlay Buffer Font family descriptor FORTRAN FPU FORmula TRANslator Floating Point Unit FRAD Frame Relay Access Device FROM Factory ROM FRU Field Replaceable Unit FS Field Separator FS File Separator FSB Front Side Bus FSF Free Software Foundation FSK Frequency Shift Keying FT FTAM Fault Tolerant File Transfer and Access Method FTP File Transfer Protocol FTP Foil Twisted Pair FTTC Fibre To The Curb FTTH Fibre To The Home FTTP Fibre To The Building FUP Funktionsplan G GAL GATF GB Global Address List Graphic Arts Technical Foundation GigaByte (1,073,741,824 bytes) GCR Group Coded Recording GDG Generation Data Group GDS Global Directory Service GDT Global Descriptor Table GDTR GE GETVIS Global Descriptor Table Register Graphic Escape GET VIrtual Storage GID Group ID GIF Graphics Interchange Format GIS Generalized Information System GIX Global Internet Exchange GKS Graphical Kernel System GML Generalized Markup Language GOSIP GP GPIB Government OSI Profile General Protection General-Purpose Interface Bus GRS Global Resource Serialization GS Group Separator GTF Generalized Trace Facility GUI Graphical User Interface GUIP people GUUG Graphical User Interface for Blind German Unix User Group H H&J Hyphenation and Justification HA Home Address HA Host Agent HADA High Availability Disk Array HCL Hue, Chroma, and Luminance HDA Head-Disk Assembl HDBV Host Data Base View HDLC High Level Data Link Communications HDSL High-bit rate Digital Subscriber Loop HDTV High Definition TV HE High End (system) HGC Hercules Graphics Card HIC Host Interface Computer HLL High Level Language HLS Hue-Lightness-Saturation HMD Head-Mounted Display HMMP HyperMedia Management Protocol HMMS HyperMedia Management Schema HPCL Hewlett-Packard Control Language HPFS High Performance File System HPGL Hewlett-Packard Graphical Language HPR HR HSB HSELAN HSI HSLAN High Performance Routing Horizontal Rule Hue-saturation-brightness High Speed ELAN Hue-Saturation-Intensity High Speed LAN HSSI High Speed Serial Interface HSV Hue-Saturation-Value HT Horizontal Tab HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol Hz Hertz I I-Net Intranet I/O Input/Output I/O Input/Output IA5 International Alphabet Five IAB Internet Activities Board IC Integrated Circuit ICEM Integrated Computer Engineering and Manufacturing ICMP ID Internet Control Message Protocol Identifier IDA Indirect Data Addressing IDA Intelligent Drive Array IDE Integrated Drive Electronics IDEA International Data Encryption Algorithm IDL Interfacce Definition Language IDT Interrupt Descriptor Table IEC InterExchange Carrier IEEE Institute of Electrical and Electronic Engineers IETF IF IFF Internet Engineering Task Force Interrupt Flag Interchange File Format IFIP International Federation of Information Processing IFS Interchange File Separator IFS InterFrame Space IGES Initial Graphics Exchange Specification IGMP IGS II Internet Group Membership Protocol Interchange Group Separator Interactive Interface IISP Interim Interswitch Signaling Protocol IKT Informatione- und Kommunikationstechnik ILC InterLanguage Communication IML Initial Microcode Load IMPL Initial Microprogram Load IMR Interrupt Mask Registers IMS Information Management System IMS/VS Information Management System / Virtual Storage INP Inhibit Presentation INT INTerrupt IOC ISDN Ordering Code IOCP Input/Output Configuration Program IOCS Input/Output Control System IOGEN IOPL IOS IP IPL IPM Input/Output device GENeration Input/Output Privilege Level Input/Output Supervisor Internet Protocol Initial Program Load InterPersonal Message IPSE Integrated Project Support Environment IPX Internet Packet Exchange IR IRC IRDS System Index Return Internet Relay Chat Information Resource Dictionary IRQ Interrupt ReQuest IRS Interchange Recors Separator IS Information System IS Intermediate System IS International Standard ISA Industry Standard Architecture ISAM Indexed Sequential Access Method ISDN Integrated Services Digital Network ISFMS System Indexed Sequential File Management ISMF Facility Interactive Storage Management ISO International Standardization Organisation ISO IEC ISO International Electrotechnical Commitee ISODE ISO Development Environment ISP ISPF Facility Internet Service Provider Interactive System Produvtivity ISPF/PDF ISPF Program Development Facility ISR Information Storage and Retrieval ISR Intermediate Session Routing ISSE Intel SIMD Sreaming Extension ISV Independent Software Vendor IT ITB ITLD Indent Tab Intermediate Transmission Block International Top-Level Domain ITRC Information Technology Requirements Council ITU International Comunication Union (ehem. CCITT) ITV Interactive TeleVision IUS Interchange Unit Separator IWS Intelligent WorkStation J JCC Job Control Command JCL Job Control Language JCS Job Control Statement JCT JES Control Table JCT Journal Control Table JECL Job Entry Control Language JEIDA Japan Electronics Industry Development Association JES JPEG Job Entry Subsystem Joint Photographic Experts Group K K KB KBPS Kilobyte KiloByte (1,024 Bytes) KiloBits Per Second kHz KiloHertz KIP Kinetics Internet Protocol KIPS KL Kilo Instructions per second Key Length KOPS Kilo Operations per second KSDS Key Sequenced Data Set KVA L KiloVolt Ampere L2F Layer 2 Forwarding L2TP Layer 2 Tunneling Protocol LAN Local Area Network LAPS LAN Adapter Protocol Support Program LBL Label LCD Liquid Crystal Display LCS Lotus Communication Server LDAP Protocol Lightweight Directory Access LDMF Librarian Disc Master File LDS Linear Data Set LDT Local Descriptor Table LE Low End (system) LEC LAN Emulation Client LEC Local Exchange Carrier LED Light Emitting Diode LF Linefeed LIC Line Interface Computer LIFO Last In, First Out LILO Last In, Last Out LILO Linux Loader LIM-EMS LIOCS Lotus Intel Microsoft EMS Logical Input/Output Control System LISP List Programming LLC2 Logical Link Control Layer 2 LOC Lines Of Code LOS Local Operator System LPI Lines Per Inch LRC Longitudinal Redundancy Checking LRU Least Recently Used LSD Least Significant Digit LSI Large Scale Integration -> VLSI LU Logical Unit LUB Logical Unit Block LUT Look Up Table LVT Light Valve Technology LW Line Work LZ Lempel-Ziv LZW Lempel-Ziv-Welch M MAC Media Access Control MAN Metropolitan Area Network MAP Maintenance Analysis Procedure MAP Manufacturing Automation Protocol MAPI Messaging Applications Programming Interface MB MBCS MBONE MBPS MegaByte (1,048,576 bytes) Multiple Byte Character Set Multicast Backbone MegaBits Per Second MCA Micro Channel Architecture MCBF Mean Cycles Between Failures MCCOI Multimedia Communications Community of Interest MCGA MultiColour Graphics Array MCI Media Control Interface MD Management Domain MD5 Message Digest 5 MDA Monochrome Display Adapter MEB Memory Expansion Board MFA Modify Field Attribute MFC Microsoft Foundation Classes MFKS Multifunktionales Konferenzsystem MFLOPS Million Floating-Point Operations Per Second MFM Modified Frequency Modulation MFV Multi File Volume MFWS MGA MH MHS MI MIB MultiFunction WorkStation Monochrome Graphic Adapter Mobile Host Message Handling System Multiple Inheritance Management Information Database MICR Magnetic Ink Character Reader MIDI Musical Instrument Digital Interface MIME Multipurpose Internet Mail Extensions MIPS Millions of Instructions Per Second MISC Minimum Instruction Set Computer > CISC, RISC MLPPP MultiLink PPP MMDF Multi-Channel Memorandum Distribution Facility MMDS Multi-Megabit Data Services MMFS Manufacturing Manage Format Standard MMX Multi Media eXtensions MNP Microcom Network Protocol MODEM MOdulator/DEModulator MOPS Mega Operations per second MOTIS Systems Message-Oriented Text Interchange MP MPC MPEG Multiprocessing Multimedia PC Motion Picture Experts Group MPOA MultiProtocol Over Asynchronous transfer mode MPSD MPX MultiPath Storage Director multiplex MS MS-DOS Message Store Microsoft Disk Operating System MSA Metropolitan Statistical Area MSD Most Significant Digit MSG Message MSM MultiSession Monitor MSW Machine Status Word MTA Message Transfer Agent MTBF MeanTime Between Failures MTDA Mean Time Data Availability MTS Message Transfer System MUD Multi-User Dungeon MULTICS MULTiplexed Information and Computing Service MUMPS Massachusetts General Hospital Utility Multi-Programmings System MUMPS Multi-User MultiProgrammingSystem MVS Multiple Virtual System MVS/ESA Multiple Virtual System / Extended System Architecture MVS/XA Multiple Virtual System / Extended Architecture MVSCP MVS Configuration Program N NAC Network Adapter Card NAK Negative Acknowledgement NAP Network Access Point NAS Network Access Server NAT Network Address Translation NAU Network Addressable Unit NBS National Bureau of Standards NBS Numeric BackSpace NC NCCF Facility Numeric Control Network Communication Control NCP Network Control Processor NCP Network Control Program NCP/VS Storage Network Control Program/Virtual NDIS Network Driver Interface Specification NetSP Network Security Program NFNT New font numbering table NFS NHRP Network File System Next Hop Routing Protocol NIC Network Interface Card NIC Network Information Center NIS Network Information Service NIST National Institute for Standards and Technology NJE Network Job Entry NL New Line NLQ Near Letter Quality NLT Nucleus Load Table NMI NonMaskable Interrupt NNTP NSA NSC1 Network News Transport Protocol National Security Agency Network Systems Cypher One NSP Numeric Space NSS NATURAL Security-System NT Network Termination NTS/2 Network Transport Services/2 NTSC National Television System Committee NUI Network User Identification NUL Null NUMA Non-Uniform Memory Access NVOD Near Video On Demand NVRAM NVS NonVolatile Random Access Memory NonVolatile Storage O O/R Originator / Recipient OC3 155 Mbit/s OCR Optical Character Recognition OCX OLE Control Extension ODA Open Document Architecture ODSI Open Directory Service Interfaces OEM Original Equipment Manufacturer OI OLE OLTEP Object Interface Object Linking and Embedding On-Line Test Executive Program OLTP On-Line Transaction Processing OMG Object Management Group OMR Optical Mark Recognition OO OOA OODBMS OOP Objektorientierung Objektorientierte Analyse Object Oriented DBMS Objektorientierte Programmierung OOPL Object Oriented Programming Language OOPS System Object Oriented Programming OP Operator Panel OPI Open Prepress Interface ORB Object Request Broker OS Operating System OS/2 Operating System/2 OSA Office Systems Architecture OSA Open System Architecture OSF Open Software Foundation OSI Open Systems Interconnection OSI/RM OSI Reference Model OSNS Open Systems Network Support OSPF Open Shortest Path First OSTC Open System Testing Consortium OTPROM OWL One Time Programable ROM Object Windows Library P PABX Private Automatic Branch Exchange PAD Packet Assembly Disassembly PAL Phase Alternating Line PAL Programmable Array Logic PAM Partitioned Access Method PAP Password Authentication Protocol PB bytes) PBX PetaByte (1,125,899,906,842,624 Private Branch Exchange PC Personal Computer PC Personal Computing PC Program Control PCB Printed Circuit Board PCB Program Control Block PCI Peripheral Component Interface PCI Program Controlled Interuption PCIL Private Core Image Library PCL Printer Control Language PCM Plug Compatible Manufacturers PCMCIA Personal Computer Memory Card International Association PCN Personal Communication Network PCP Program Control Program PCS Personal Communication Services PCT Private Communication Technology PCT Program Control Table PD Public Domain PDA Personal Digital Assistant PDAD Proposed Draft Addendum PDAU Physical Data Access Unit PDF Program Development Facility PDL Page Description Language PDO Portable Distributed Objects PDS Partitioned Data Set PDS Premise Distribution System PDS Processor Direct Slot PDU Protocol Data Unit PDX Printer Description Extension PE Printer's error PE Protection Enabled PEARL Processor and Experiment Automation Realtime Language PEM Privacy Enhanced Mail PEP Partitioned Emulation Program PER Program Event Recording PERL Practical Extraction and Report language PF Parity Flag PFK Program Function Key(board) PFM Printer Font Metric PGA Professional graphics adapter PGP Pretty Good Privacy PIB Program Information Block PID Process ID PIFS Point InterFrame Space PIM Personal Information Management PIN Personal Identification Number PIOCS System PL PL/1 PLI PLPA Physical Input/Output Control Procedure Library Programming Language 1 Programming Language 1 Pageable Link Pack Area PLT Program List Table PLU Primary Logical Unit PMMU Paged memory management unit PMS Pantone Matching System PMS Project Management System PMT Photomechanical Transfer (photostat) PMT Photomultiplier Tube PNNI Private Network-to-Network Interface POC Program-Operator Communication POP Point Of Presence POP Post Office Protocol POSIX for UNIX Portable Operating System Interface POTS Plain Old Telephone System POWER Priority Output Writer, Execution processors and input Readers PP PPD Presentation Position PostScript Printer Description PPGA Plastic Pin Grid Array PPM Pages Per Minute PPP Point-to-Point Protocol PPT Processing Program Table PPTP PPV PRDMD Domain PRL Point-to-Point Tunneling Protocol Pay Per View Private Directory Management Private Relocatable Library PRMD Private Management Domain PROM Programable Read Only Memory PSB Program Specification Block PSDN PSRAM Packet Swiched Data Network Pseudo SRAM PSSL Private Source Statement Library PSTN Public Swiched Telephone Network PSW Program Status Word PTF Program Temporary Fix PTR PoinTeR PU Physical Unit PUB Physical Unit Block PVC Permanent Virtual Circuit PVP Packet Video Processor PWB Printed Wire Board PWS Programmable WorkStation Q QAM Quadrature Amplitude Modulation QBE Query By Example QCIF Quater Common Intermediate Format QIC QSAM Quarter-Inch Cartridge Queued Sequential Access Method QTAM Method Queued Teleprocessing Access R R0 Record zero RACF Resource Access Control Facility RAID Disks Redundant Array of Inexpensive RAID Disks Redundant Array of Independent RAM Random Access Memory RARP Reverse Address Resolution Protocol RBA RC Relative Byte Adresse Robot Control RCP Remote Communication Processor RCS Revision Control System RDA Remote Data Access RDBMS System Relational DataBase Management RDN Relative Distinguished Name RES Restore RF Resume Flag RFC Request For Comments RFF Required Form Feed RFS Remote File System RGB Red, Green, Blue RGM Red, Green, Blue (Monitor) RIFF Resource Interchange File Format RIP Raster Image Processor RIP Router Information Protocol RISC Reduced Instruction Set Computer RJE Remote Job Entry RL Relocatable Library RLD Relocation Dictionary RLE Run Length Encoded file RLL Run Length Limited RMF Resource Management Facility RNL Required New Line ROM Read Only Memory RPC Remote Procedure Call RPG Report Program Generator RPL Requestor's Privilege Level RPL Research Programming Language RPM Revolutions Per Minute RPS Rotational Position Sensing RPT Repeat RRDS Relative Record Data Set RRED Right Reading Emulsion Down RREU Right Reading Emulsion Up RS RSP RSVP RTC RTCP RTF RTM/SF RTP RTSE RWSI S Record Separator Required Space Resource Reservation Protocol Real Time Clock Realtime Transport Control Protocol Rich Text Format Realtime Monitor / Systems Facility Realtime Transport Protocol Reliable Transfer Service Element Remote Workstation Interface S.W.I.F.T. Society for Worldwide Interbank Financial Telecommunication S/STP SA Shielded STP Set Attribute SAA Storage Accounting Area SAA System Application Architecture SAM Sequential Access Method SAP Service Access Point SAP Service Advertising Protocol SAR Segmentation And Reassembly SBCS SBS SC SCA Single Byte Character Set Subscript Storage Control Shared Control Array SCCS Source Code Control System SCDS Source Control Data Set SCI Scalable Coherent Interconnect SCODL Scanned Conversion Object Description Language SCP Storage Control Program SCP SCRAM Memory System Control Program Static Column Random Access SCSI Small Computer Systems Interface SDH Synchronous Digital Hierarchy SDK Software Development Kit SDL System Directory List SDLC SDRAM SDSF Synchronous Data Link Control Synchronous DRAM System Display and Search Facility SE Software Entwicklung SE System Engineer SECC SECAM SEL SEPP SET Single Edge Contact Connector Sequential Couleur a'Memorie Select Single Edge Processor Package Software-Engineering-Technology SF Sign Flag SF Support Facility SFA Salesforce Automation SFBI Shared Frame Buffer Interconnect SFE Start Field Extended SFT System Fault Tolerance SFTP Shielded Foil Twisted Pair SGML Standard Generalized Markup Language SHTTP SHY Secure HTTP Syllable Hyphen SI Shift In SI Single Inheritance SI Standard Interface SIFS Short InterFrame Space SIFT Stanford Information Filtering Tool SIG Special Interest Group SIM Service Information Message SIMD Single Instruction Multiple Data SIMM Single In-line Memory Module SIRDS Single Image Random Dot Stereogram SIT System Initialization Table SL SLD Source Statement Library Structured Logic Design SLED Single Large Expensive Disk SLIP Serial Line Internet Protocol SLR Service Level Reporter SLU Secondary Logical Unit SM Set Mode SMDS Switched Multimegabit Data Service SMF System Management Facility SML MVS Storage Management Library SMLI Stateful MultiLayer Inspection SMP Symetric MultiProcessing SMP System Modification Program SMS Storage Management Subsystem SMTP SNA Simple Mail Transfer Protocol System Network Architecture SNADS SNA Distribution Services SNMP Protocol Simple Network Management SNOBOL String Oriented Symbolic Language SNT SO Sign-On Table Shift Out SOD Service On Demand SOH Start Of Heading SOM System Object Model SOS Start Of Significance SP SPA Space Software Publishers Association SPARC Scalar Processor ARChitecture SPDU Session Protocol Data Unit SPM SPOOL On Line System Performance Monitor/2 Simultaneous Peripheral Operations SPP Scalable Parallel Processing SPS Superscript SPX Sequenced Packet eXchange SQL Structured Query Language SQL/DS System SRAM Structured Query Language / Data Static Random Access Memory SRT System Recovery Table SRU Shared Resource Unit SS Single Sided SS Stack Segment SSCP System Service Control Point SSID SubSystem IDentifier SSL Secure Socket Layer STM Synchronous Transfer Mode STP Shielded Twisted Pair STT Secure Transaction Technology STX Start of Text SUB Substitute SV Storage Violation SVA Shared Virtual Area SVC Supervisor Call SVC Switched Virtual Circuit SVGA SW SWOP Printing Super-VGA Switch Specifications for Web Offset SYN SYSOP Synchronous Idle System Operator T T1 1.544 Mbit/s T3 45 Mbit/s TARGA Truevision Advanced Raster Graphics Adapter TB TeraByte (1,099,511,627,776 bytes) TC Terminal Control TCA TCAM Task Control Area Telecommunications Access Method TCB Task Control Block TCL Tool Command Language TCM Thermal Conduction Module TCO Triple Capacity Option TCP Terminal Control Program TCP Transmission Control Protocol TCP/IP Transmission Control Protocol/Internet Protocol TCT Terminal Control Table TCTTE Entry TCU TD Terminal Control Table Terminal Transmission Control Unit Transient Data TDIA Transient Data Input Area TDM Time-Division Multiplexing TDOA Transient Data Output Area TDP Transient Data Program TEO Technical Electronic Office TF Trap Flag TIC Technical Integrity Check TIFF Tagged Image File Format TIOA Terminal Input/Output Area TLB Translation Lookaside Buffer TLBL Tape Label TMO Thermo-Magneto-Optic technology TNEF Format Transport-Neutral Encapsulation TOC Table Of Contents TOP Technical Office Protocol TPDU Transport Protocol Data Unit TPF Transaction Processing Facility TPI Tracks Per Inch TPM Third-Party Maintenance TPS Transactions Per Second TRN Transparent TS Telecommunication System TS Temporary Storage TSIOA Area Temporary Storage Input/Output TSO Time Sharing Option TSP Temporary Storage Program TSR Terminate and Stay Resident TTA Teletex Attachment (Teletexzusatz) TTL Transistor Transistor Logic TTR Track Record TTY TeleTYpe TWA Transaction Work Area TWA Two-Way Alternate TWS Two-Way Simultaneous TX TXT Telex Text U UA UAE User Agent Unrecoverable Application error UART Universal Asynchronous Receiver/Transmitter UBR Undefined Bit Rate UBS Unit Backspace UCB Unit Control Block UCR Undercolor removal UCS Universal Character Set UCSB Universal Character Set Buffer UCW Unit Control Word UDP User Datagram Protocol UI UID User Interface User ID UMB Upper Memory Block UNC Universal Naming Convention UNC Universal Network Convention UPC Universal Product Code UPS Uninterruptible Power Supply UPSI User Program Switch Indicator UR Unit Record URL Uniform Resource Locator US Unit Separator USART Universal Synchronous/Asynchronous Receiver/Transmitter USENET USM USEr NETwork UnSharp Masking USRT Universal Synchronous Receiver/Transmitter USV Unterbrechungsfreie StromVersorgung UTP UUCP Unshielded Twisted Pair Unix-to-Unix Copy Program V VAD Value Added Dealer VAN Value Added Network VAP Value Added Process VAR Value Added Reseller VAST Virtual Archive Storage Technology VB Visual Basic VBA Visual Basic for Applications VBR Variable Bit Rate VBN Vermitteltes Breitbandnetz VC Virtual Circuit VC-SDRAM Virtual Channel SDRAM VCC Virtual Circuit Connection VCI Virtual Circuit Identifier VCNA Vtam Communication Network Application VCPI VDAC Virtual Control Program Interface Video Digital Analog Converter VDI Video Display Interface VDT Video Display Terminal VDU Visual Display Unit VERONICA Very Easy Rodent-Oriented Netwide Index to Computerized Archives VGA Video Graphics Array VGC Video Graphics Controller VGM Video Graphics Monitor VHDSL Loop Very High-bit rate Digital Subscriber VHLL Very High-Level Language VHS Video Home System VIO Video Input/Output VIO Virtual Input/Output VIPA Virtual IP Addressing VLAN Virtual LAN VLSI Very Large Scale Integration VM Virtual Machine VM/SP VMMAP Virtual Machine / System Product VM Monitor Analysis Program VMOS Vertical MOS VMPPF VM Performance Planning Facility VMPRF VM Performance Reporting Facility VMS Virtual Management System VOD Video On Demand VPD Vital Product Data VPDN VPI VPN VR Virtual Private Data Network Virtual Path Identifier Virtual Private Network Virtual Reality VRAM Video RAM VRML Virtual Reality Modeling Language VRC VS Vertical Redundancy Checking Virtual Storage VSAM Virtual Storage Access Method VSAT Very Small Aperture Terminal VSM Virtual Storage Management VSN Volume Serial Number VT Vertical Tab VTAM Method Virtual Telecommunications Access VTOC Volume Table of Contents VTP Virtual Terminal Protocol VTP Virtual Terminal Program VTX VideoTeXt VVDS VSAM Volume Data Set W W3 W4WG World Wide Web Windows for Workgroups WABI Windows Application Binary Interface WAIS Wide Area Information Service WAN Wide Area Network WATM Wireless ATM WATS Service Wide Area Telecommunications WHAT bounded Wireless Hybrid Asynchronous Time- WIMP Windows, Icons, Mice and Pointers WINS Windows Internet Name Service WMAC Wireless Media Access Control WMF WORM Windows metafile Write Once, Read Many times WOSA Windows Open Services/Systems Architecture WRED Wrong Reading Emulsion Down WREU Wrong Reading Emulsion Up WS WorkStation WTO Write To Operator WUS Word Underscore WWW World Wide Web WXTRN Weak External Reference WYSIWYG What You See Is What You Get X XA EXtended Architecture XIP Execute In Place XLT Transaction List Table XMS XT Extended Memory Specification eXtended Technology Y Y2K Year 2000 YIQ space) (color components in NTSC color YUV (color components in SECAM and PAL color spaces) Z ZBR Zero Bug Release ZD Zero Defects ZF Zero Flag